Team Members: Lonneishea Nichols, Cody Meynig, and Kaz Talcott
SCENARIO: Several mobile marketing users complain that they cannot obtain certificates for their laptop computers from the stand-alone CA used to issue certificates. You suspect that the stand-alone CA is not trusted by the laptop computers used by your mobile users. You need to ensure that all mobile users can obtain certificates from your stand-alone CA used to issue certificates. (Lonneishea) Now that you have acquired a stand-alone CA you’re going to need to encrypt this info, in order to transport highly sensitive information from your laptop to your boss’s computer back the office. Once that’s finished you must now create and attach a public key to your newly created certificate. (Cody Meynig)
Team Members: Lonneishea Nichols, Cody Meynig, and Kaz Talcott
SCENARIO:
Several mobile marketing users complain that they cannot obtain certificates for their laptop computers from the stand-alone CA used to issue certificates. You suspect that the stand-alone
CA is not trusted by the laptop computers used by your mobile users. You need to ensure that all mobile users can obtain certificates from your stand-alone CA used to issue certificates. (Lonneishea) Now that you have acquired a stand-alone CA you’re going to need to encrypt this info, in order to transport highly sensitive information from your laptop to your boss’s computer back the office. Once that’s finished you must now create and attach a public key to your newly created certificate. (Cody Meynig)